First published: Wed Jul 27 2022(Updated: )
Jenkins Lucene-Search Plugin 370.v62a5f618cd3a and earlier does not perform a permission check in several HTTP endpoints, allowing attackers with Overall/Read permission to reindex the database and to obtain information about jobs otherwise inaccessible to them.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Lucene-search | <=370.v62a5f618cd3a | |
maven/org.jenkins-ci.plugins:lucene-search | <=370.v62a5f618cd3a | 387.v938a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36910 is classified as a medium severity vulnerability due to its potential for unauthorized access to sensitive job information.
To fix CVE-2022-36910, upgrade to version 387.v938a or later of the Jenkins Lucene-Search Plugin.
CVE-2022-36910 is caused by a lack of permission checks in several HTTP endpoints of the Jenkins Lucene-Search Plugin.
Users of Jenkins Lucene-Search Plugin versions up to 370.v62a5f618cd3a are affected by CVE-2022-36910.
Attackers with Overall/Read permission can exploit CVE-2022-36910 to reindex the database and access otherwise restricted job information.